Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 118 / 214
4261 résultats taggé E*N  ✕
NoName057(16) | https://www.netscout.com/blog/asert/noname057-16
17/01/2024 11:29:32
QRCode
archive.org
thumbnail

NoName057(16) relies heavily on HTTPS application-layer DDoS attacks, with many attacks repeatedly sourced from the same attack harness, networks, and targeting similar countries and industries.

netscout EN 2024 ddos russia ukraine NoName057 NoName NoName057(16) DDoS hacktivism geopolitics crypto nato russo-ukrainian http https http-attacks https-attacks application-layer-attacks ddosia bobik ddos-for-hire golang bulletproof
CVE-2023-46805 https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis
16/01/2024 14:39:31
QRCode
archive.org
thumbnail

Starting January 10, 2024, multiple parties (Ivanti, Volexity, and Mandiant) disclosed the existence of a zero-day exploit chain affecting Ivanti Connect Secur…

attackerkb EN 2023 CVE-2023-46805 Ivanti 0-day API
Apple fixed a bug in Magic Keyboard that allows to monitor Bluetooth traffic https://securityaffairs.com/157448/hacking/apple-bug-monitor-bluetooth-traffic.html
16/01/2024 08:52:14
QRCode
archive.org
thumbnail

Apple addressed a recently disclosed Bluetooth keyboard injection vulnerability with the release of Magic Keyboard firmware.

securityaffairs EN 2024 Magic Keyboard firmware Bluetooth CVE-2024-0230
Ivanti Connect Secure VPN Exploitation Goes Global https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/
16/01/2024 08:42:34
QRCode
archive.org
thumbnail

On January 10, 2024, Volexity publicly shared details of targeted attacks by UTA00178 exploiting two zero-day vulnerabilities (CVE-2024-21887 and CVE-2023-46805) in Ivanti Connect Secure (ICS) VPN appliances. On the same day, Ivanti published a mitigation that could be applied to ICS VPN appliances to prevent exploitation of these vulnerabilities. Since publication of these details, Volexity has continued to monitor its existing customers for exploitation. Volexity has also been contacted by multiple organizations that saw signs of compromise by way of mismatched file detections. Volexity has been actively working multiple new cases of organizations with compromised ICS VPN appliances.

volexity EN 2024 CVE-2024-21887 CVE-2023-46805 Ivanti Connect Secure Exploitation mass-exploitation
Opera MyFlaw Bug Could Let Hackers Run ANY File on Your Mac or Windows https://thehackernews.com/2024/01/opera-myflaw-bug-could-let-hackers-run.html?m=1
15/01/2024 15:42:55
QRCode
archive.org
thumbnail

Critical security flaw found in Opera Browsers. MyFlow sync feature lets attackers take over your Windows and macOS systems.

thehackernews 2024 EN Critical Opera Browsers MyFlow vulnerability
Chrome Users Now Worth 30% Less Money Thanks to Google's Cookie Killing, Ad Firm Says https://gizmodo.com/google-chrome-users-worth-less-money-cooking-killing-1851159736
15/01/2024 11:28:34
QRCode
archive.org
thumbnail

A week into phase one of Google’s cookie killing project in Chrome, early tests show how it could hit the web’s bottom line.

gizmodo EN 2024 Google Business Finance Online-advertising G/O-Media Tracking Jason-Kint Technology Internet Paul-Bannister Targeted-advertising Walmart Google-Chrome World-Wide-Web Privacy-Sandbox Safari Web-browsers disney META HTTP-cookie Internet-privacy Alphabet-Inc
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days https://securityscorecard.com/blog/threat-intelligence-research-volt-typhoon/
15/01/2024 11:22:34
QRCode
archive.org
thumbnail

SecurityScorecard has discovered the threat actor group Volt Typhoon has compromised 30% of Cisco RV320/325 Devices in 37 Days. Learn more.

securityscorecard EN 2024 VoltTyphoon Cisco RV320/325 research compromised
Welcome To 2024, The SSLVPN Chaos Continues - Ivanti CVE-2023-46805 & CVE-2024-21887 https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887/
15/01/2024 11:11:37
QRCode
archive.org
thumbnail

Did you have a good break? Have you had a chance to breathe? Wake up.

It’s 2024, and the chaos continues - thanks to Volexity (Volexity’s writeup), the industry has been alerted to in-the-wild exploitation of 2 incredibly serious 0days (CVE-2023-46805 and CVE-2024-21887 - two bugs, Command Injection

watchtowr.com EN 2024 CVE-2024-21887 CVE-2023-46805 SSLVPN Ivanti
Further analysis of Denmark attacks leads to warning about unpatched network gear https://therecord.media/denmark-attacks-forescout-analysis-zyxel
15/01/2024 08:46:23
QRCode
archive.org
thumbnail

What happened in Denmark can also happen to you, cybersecurity researchers are warning in a new report that examines attacks against the country’s energy sector last year.

Waves of incidents in May that seemed like a highly-targeted effort by a nation-state actor — perhaps Russia’s Sandworm hacking group — might have been less connected than originally thought, according to a new report by Forescout.

The researchers say their analysis found two distinct waves against Danish energy providers, and evidence suggests they were unrelated.

therecord EN 2024 Denmark Sandworm unpatched SektorCERT
QNAP Patches High-Severity Flaws in QTS, Video Station, QuMagie, Netatalk Products https://www.securityweek.com/qnap-patches-high-severity-flaws-in-qts-video-station-qumagie-netatalk-products/
15/01/2024 07:21:09
QRCode
archive.org

QNAP has released patches for a dozen vulnerabilities in its products, including several high-severity flaws.

securityweek EN 2023 QNAP vulnerabilities High-Severity
Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer https://thehackernews.com/2024/01/beware-youtube-videos-promoting-cracked.html?m=1
15/01/2024 07:19:53
QRCode
archive.org
thumbnail

Beware of YouTube videos offering cracked software! They might be a gateway to the Lumma malware, stealing your sensitive information

thehackernews EN 2024 Lumma Stealer vulnerability
Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe https://thehackernews.com/2024/01/turkish-hackers-exploiting-poorly.html?m=1
15/01/2024 07:18:40
QRCode
archive.org
thumbnail

Turkish hackers targeting poorly secured MS SQL servers across the U.S., European Union, and Latin America.

thehackernews EN 2024 Turkey MSSQL exploitation
ShinyHunters member gets 3 years in prison for breaching 60 firms https://www.bleepingcomputer.com/news/security/shinyhunters-member-gets-3-years-in-prison-for-breaching-60-firms/
15/01/2024 07:17:59
QRCode
archive.org
thumbnail

The U.S. District Court in Seattle sentenced ShinyHunters member Sebastien Raoult to three years in prison and ordered a restitution of $5,000,000.
#Broker #Computer #Customer #Data #Hackers #InfoSec #Legal #Prison #Security #ShinyHunters #Theft

bleepingcomputer EN 2024 Data InfoSec Legal ShinyHunters
Turkish hackers targeting database servers with Mimic ransomware https://therecord.media/turkish-hackers-targeting-databases-mimic
15/01/2024 07:11:11
QRCode
archive.org
thumbnail

The “RE#TURGENCE” campaign is targeting victims in the E.U., U.S. and Latin America by going after Microsoft SQL, researchers with Securonix found.

therecord.media EN 2024 Turkey RE#TURGENCE capaign
Anthropic researchers find that AI models can be trained to deceive https://techcrunch.com/2024/01/13/anthropic-researchers-find-that-ai-models-can-be-trained-to-deceive/
15/01/2024 06:44:13
QRCode
archive.org
thumbnail

A study co-authored by researchers at Anthropic finds that AI models can be trained to deceive -- and that this deceptive behavior is difficult to combat.

techcrunch EN 2024 AI models study deceive research Anthropic
CVE-2024-21591 - Juniper J-Web OOB Write vulnerability https://censys.com/cve-2024-21591-juniper-j-web-oob-write-vulnerability/
14/01/2024 12:26:19
QRCode
archive.org
thumbnail
  • Juniper Networks recently patched a critical pre-authentication Remote Code Execution (RCE) vulnerability in the J-Web configuration interface across all versions of Junos OS on SRX firewalls and EX switches.
  • Unauthenticated actors could exploit this vulnerability to gain root access or initiate Denial of Service (DoS) attacks on devices that have not been patched. Ensure your systems are updated promptly to mitigate this risk.
  • Check for exposed J-Web configuration interfaces using this Censys Search query: services.software.uniform_resource_identifier: cpe:2.3:a:juniper:jweb:*:*:*:*:*:*:*:*.
  • As emphasized last year in CISA’s BOD 23-02 guidance, exposed network management interfaces continue to pose a significant risk. Restrict access to these interfaces from the public internet wherever possible.
censys EN 2024 CVE-2024-21591 Juniper J-Web OOB vulnerability RCE exposed
Hackers can infect network-connected wrenches to install ransomware https://arstechnica.com/security/2024/01/network-connected-wrenches-used-in-factories-can-be-hacked-for-sabotage-or-ransomware/
13/01/2024 16:57:55
QRCode
archive.org
thumbnail

Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.

arstechnica EN 2024 wrenches ransomware IoT
Cryptojacker arrested in Ukraine over EUR 1.8 million mining scheme https://www.europol.europa.eu/media-press/newsroom/news/cryptojacker-arrested-in-ukraine-over-eur-1.8-million-mining-scheme
13/01/2024 14:18:40
QRCode
archive.org
thumbnail

The 29-year-old individual was apprehended in Mykolaiv, Ukraine, on 9 January. Three properties were searched to gather evidence against the main suspect. The arrest comes after months of intensive collaboration between Ukrainian authorities, Europol and a cloud provider, who worked tirelessly to identify and locate the individual behind the widespread cryptojacking operation.The suspect is believed to have mined over USD...

europol EN 2024 apprehended Ukraine Cryptojacker arrested
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html
12/01/2024 15:25:42
QRCode
archive.org
thumbnail

This blog delves into the Phemedrone Stealer campaign's exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, for its defense evasion and investigates the malware's payload.

trendmicro EN 2023 CVE-2023-36025 Phemedrone Stealer
Attack of the week: Airdrop tracing – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2024/01/11/attack-of-the-week-airdrop-tracing/
12/01/2024 11:33:32
QRCode
archive.org
thumbnail

It's been a while since I wrote an "attack of the week" post, and the fault for this is entirely mine. I've been much too busy writing boring posts about Schnorr signatures! But this week's news brings an exciting story with both technical and political dimensions: new reports claim that Chinese security agencies have developed…

cryptographyengineering EN 2023 Airdrop Cryptographic analysis tracing
page 118 / 214
4845 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn